tv Politics Public Policy Today CSPAN July 18, 2014 11:00am-1:01pm EDT
failed. the fact their thinking long term and recognize all of these piece parts have to learn how to work together in order to get there, i want to congratulate you for that. we have a set of incentives and metrics in this country that i think are a great disservice today. i watch all these systems. i would argue, for example, in both economics and political science or international relations and our universities, most of the top faculty are teaching what they learned in the '60s. there are no incentives to learn new things. they have to have whatever they write cited by their friends who are all educated at the same time. anyway, all i'm suggesting is -- it's true. it's a real problem for what we are dealing with today. i was in liberia in 1960.
things have changed a lot. i think it's really impresentesive and i feel really good about that. thank you. >> thank you so much. i'm with new rules for global finance. i wanted to pick up on the tax issues. i note in the g-20 when they talk about tax and context of development they say we really have to do capacity building. i'm wondering if the african finance ministers and central bank governors and so on, tax administrators, if on a continental basis you have been able to get together and say, here is the capacity building we want and need and here are our preferred instructors. if not, i'll work with you. >> one more. >> i'm with the center for
global development here in d.c. my question is, i was hoping would you touch on the measurability of some of these targets. i know one of the greatest strengths about the mbgs was they had these specific percentages and numbers that people could actually tangibly measure to varying degrees. obviously, there is some discussion about the measurability of them, but looking forward to the new framework, what has been your experience with the discussions about how we go about measuring these and comparing progress from year to year? because i think that has been a huge strength. and also development nowadays is very much focused on the ability to measure the impact. i'm curious what your thoughts on that are? >> i have a question also relating to financing. i want to know what you consider the role and impact of the new
bric's development bank will be going forward as it starts in south africa and other countries can then apply to be a part of this new development bank. thank you. >> i'll let them talk about the bric's bank. i heard about it. they were supposed to set it up a few months ago and what it is, i'm not sure. measurability. now we talk a lot about revolution in africa we don't know. the problem has been a lot of things have happened in mbgs, but we don't have the instrument or we have not developed the instrument to measure them. people say well, we have 80% of kids in schools. we have 90% of this or that, but how did we measure them? sometimes we rely on numbers given by multinationals,
multilaterals, but also sometimes by those who have an interest in keeping numbers as they are. because that's where they get funding from. we have to be aware of them. the finance ministers have a meeting. when the president first talked about a cap, it was at a meeting with the minister of finance and development and they talked about this issue of capacity building. capacity building at the lowest level and at the highest level. and be able to -- you cannot be accountable if you don't have the capacity. sometimes it's not just corruption. it's mismanagement sometimes. sometimes it's just not knowing what you are doing. some time money goes through the window because instead of buying this, they buy that. that is not what you need to resolve your problem. for corruption, what level of corruption you want to tolerate? a zero level, but that's a
dream. because wherever there is money, somebody is going to try to steal it if they can't get it honestly. i think the reality is that. measurability, i think that's -- >> okay. just a couple of self-promotion things in here. we did a report on governance and economic growth at csis. i recommend if you are interested in that issue, we'll give you one, dr. dukule before you leave. we did something on corruption, as well. there is something that i want to reference. up ahead on the issue of domestic research mobilization and taxes, if you look at just in africa, if i understand it correctly, the u.n. had statistics that said in the year 2000 something like $100 billion was mobilized through taxes and fees through domestic research mobilization.
by the year 2010 it was $400 billion. not all that, some of that is oil, gas and mining revenues. some of that is increased formality and people paying their taxes. some of that is a rising middle class. excludes all the large amount of leakage that dr. dukule was talking about. that is a lot of money being generated by taxes, even though it's not what it should be because there continues to be tax evasion and other challenges. a of people not paying their taxes. if you look at o dfda, it's abo $50 billion. i think we hit the high water mark. if it's $400 billion and foreign aid is about $60, there is a lot more of this than there is of this. it's five or six times or seven times the amount of foreign aid. i think you are going to see that will continue to rise as
you have an increasing middle class. african countries that discovered oil gas and mining. there's going to be a lot more government money in government coffers. i'm not saying it's a panacea, but it will be a challenge. the problem on this drm tax stuff, this is not a very sexy or compelling topic. there are no political constituencies in developed countries that are going to get a congressional earmark, to use the american parlance to pay for tax inspectors. tax inspectors without borders, that gets the heart aflutter. it's darn important because that's where the money is, but it's very difficult in the american system to find money or force money because the foreign aid dollars are spoken for. everybody agrees this is important, but the bureaucratic
politics and interest group politics in washington to how to allocate those monies goes somewhere else. not saying they are not valid and important projects, and everybody who fights and dies on that hill for their important piece of that pie, i'm sure will tell why you their slice is the most important, but i think that's where the money is and there is a lot of leverage there. we ought to be thinking about how we do. we'll have a report on this issue of domestic research mobilization. if you have trouble sleeping at night, i hope you read it. i want to talk about the bric bank briefly. we need to look at the bric bank as a purely political exercise. the bric bank is a purely political exercise. there are lot of new stories about this, a lot of froth and sizzle. i am highly skeptical. this will ultimately die with a whimper. however, to the extent we are not tending to our knitting of the united states and other
participants in the international system, to the extent countries don't feel they are fully participating, i think dr. dukule talked about some of these issues, i think he put a nuchl interesting issues on the table. to the extent share holdings don't necessarily match the size of the economy, especially in the world bank and imf, there's going to be defections from the bretton woods system. people exiting out of it. there's been a series of crypto imfs. when egypt had problems that gulfis played imf, russians said we'll bail out your banking system if you give us a naval base. there is an asian self-insurance imf. there's a world bank side to this bric bank and imf side to this new bric bank. a lot of problems, what
currency? they want to create some new currency. good luck. i don't think they are going to use yen given the participants involved. don't think they'll use euros. hard time imagining they will use the dollar. i'll be curious to see if they will do this in rubles. don't believe it. i know there's lots of press releases about this. i don't think it's real. i would say the other interesting things are the agreement that talked about human rights. lots of words about human rights in that declaration. maybe it's me, i'm thinking russia, china, human rights. figure that one out. i'm highly skeptical. it's great, but i'm not going to hold my breath. finally on things like what happens, as dr. dukule was talking about relations are a two-way street. what happens when this new development bank provides a loan to xyz country and they decide they are kicking china out as
the mining investor in zambia. elections swung on chinese engagement. are they going to pull out or not? i do believe the indians are going to bail out the chinese if there is a mega financial crisis in china? i doubt it. very interesting. i think to the extent we don't take care of things like imf quota reform which is a neighly nichi topic. has to do with a slight tweet in share holdings, people are going to take their bat and ball and go somewhere else. this is a political exercise, in my view. to the extent the united states doesn't tend to its garden, both partially a republican problem and partially a problem for the administration for not selling this, we're the only one of g-20 countries to not approve imf quota reform. there's a lot of technical stuff around this basically, it's a rejiggering of the share hold g
holdings of the imf. i think if we were to fix some things, make tweaks, this would go away quietly. people will ask whatever happened to that bric bank. quote me on that. if ten years this is the biggest things since sliced bread you can say i was totally wrong. i bet folks a sandwich and club soda this isn't going to be a serious thing in a couple of years' time. >> i think you touched something very important, which is the reform by the imf and world bank. i think that is the key issue. you will not need the bric, the bric banks and all these crypto imf that pop around. how can we get the u.s. to agree to this one little reform?
>> it requires presidential leadership and responsibility from my party the republican party. president obama cut a deal with the republicans. he should cut a deal and he should send vice president biden up there, but they need to find somebody who can make a deal. they've not spent a lot of political capital on this, frankly. they've got other things in their in box. they have tried, but i don't believe -- it doesn't excuse republican inaction on this, but i think there are a number of things i could list for you that you could get an easy deal with the republicans on. it's a political conversation, not a question of the arguments or the merits. i think the merits are there. it's a political thing. it requires presidential leadership and republican responsibility. >> okay. we are going to take just a couple more questions. then i'm going to go to the back of the room.
yes, sir. let's take these as the last two questions. >> mark harrison with the united methodist church office. thank you, mr. ambassador. you didn't mention electricity. we had this whole power africa initiative. the ambassador from botswana. you didn't say anything about agriculture. electricity for poor people then agriculture. >> thank you. >> hello, everyone. thank you so much, dr. dukule for your wonderful presentation. i wanted to ask if you could speak more about infrastructure developments as it contributes to the ability to accomplish the goals listed on the five
pillars. thank you. >> a good way to end, particularly with the summit coming up. maybe you can just say a little bit about the next steps for this as you wrap up. and the presence of the summit and what she is hoping to accomplish there. >> with the gentleman about electricity, definitely electricity should have been -- i think i go out with the things we had back in coming out of the cold war process. okay. we want to open our market, but there are conditionalities. there are so many conditions the u.s. market was not really open to africa. i don't think so. there was electricity and that links you to the issue of infrastructure. i think infrastructure is still the biggest problem in africa.
transferred to electricity, roads, road network between countries and all of that. i think we still have big issues with infrastructure. i think if we can come up with something from, if this summit, what the president expects, i think she thinks this is a historic moment. that for the first time the u.s. is saying okay, we can deal with all africa at one point, at some point. we can deal with the whole continent. not in piece meal but sit around the table with the whole continent and start a dialogue. what will come out of this meeting, i think, is symbolic. i think the first meeting, such meeting is always symbolic. let's start a dialogue. let's follow up with real tangible issues. let's set up committees. let's set up group of think tanks between africa and the u.s. let the partnership be at a level of, not only academia, not
only on the level of the politicians, but also between the private sector on the continent. the transformation we talk about economic transformation is basically and first of all an issue that goes with the private sector. the private sector is part of our conversation. one of the high-level meetings hopefully in south africa will be about partnership with the private sector. how do we feel private/public partnership and what is the role of the private sector in the 2015 development agenda? i think we have that. what we expect from the summit? i think a dialogue on all these issues, on transformation, on new way of dealing with africa and getting out of the cluster of importing oil and gas from
africa to go to different, to other sectors of the market. also be more aggressive. i think the u.s. has been very shy in africa. maybe has to do with our history. the history of the two continent u.s. has been very shy of africa. there is an opportunity. there is a market. there is a rural law in many countries and puts the possibilities on the continent that can be tackled. thank you. >> thank you very much dr. dukule and thanks to dan. thank you all for joining us. i do think there's mixed feelings about the summit coming up. the point is right that it's the beginning of a dialogue. maybe getting over some of our
phobias about africa and our notion that somehow making money and investing in africa, making money is unseemly for the united states. investment and trade are the things that are eventually going to drive the transformation. you've got structural transformation and inclusive growth that puts the electricity issue that you mentioned, the el culture issue you mentioned and the infrastructure issue right at the center of that. please join me thanking dr. dukule. we look forward to the summit.
in new york the united nations security council is meeting on the crash of the malaysian airliner in ukraine. that meeting live on c-span. you can watch it online on c-span.org. we are also asking for your comments on the investigation into the crash. you can reach us through twitter at the hash tag c-span chat or facebook page. >> it shows the incompetence of the eu aviation for routing a civilian plane over a known war zone. >> dennis offers this, all those putin lovers should be ashame of themselves. yes, he is decisive and a strong leader, yes, he just blew up 300 innocent families. offer your thoughts. go to facebook at
facebook.com/c-span. we'll have more on the crash from the white house this afternoon at 1:00 eastern. that's when press secretary john earnest is scheduled to hold his briefing. c-span will have live coverage of that. up next, the increased use of robots to analyze mass communication, subsequent loss of prif of privacy. thank you, michael. it's a great honor to discuss a paper by two lawyers i greatly admire. if there is a good overlap
between the privacy law and policy community of the robot. if any of you care about your digital privacy rights and have sort of been hoping that people have been minding the store for us, kevin and amy are two of the most able and committed story-minders on that front we have. they've done great work and continue to do great work to protect our privacy rights and other digital rights. it's a great honor to critique and comment and pull apart their paper for you. the paper which, i don't know if it is inspired by the hall and oates song, robot eyes are watching you, watching your every move. the law and policy communications surveillance makes the thesis, i stated the
abstract, robots are reading your e-mail and asks the question whether private sector, and in particular government nsa automated monitoring scanning filtering and processing of our, the contents and associated meta data of our e-mail is a legal problem. particularly given the fact that with automated box scanning, the robots, the algorithms can spy on all of us all of the time. in some respects for a mixed crowd, this is a difficult paper to talk about. it is a very artful, impressive, geeky analysis of the legal code of digital privacy rights under the fourth amendment and under
the electric communications privacy act. originally i was tempted to really dig in with you all and talk about smith v maryland and some of the other cases i have not even heard of. i realize for a crowd of lawyers and technologists and policy types interested in the broad policy questions, if we privacy lawyers were to do that, it would be a bit like the computer scientists talking about which protocols they prefer for various sorts of packet-switching functions and it would get very boring very quickly. i'm going to talk less about the law and more about the policy questions and the implications of this. a little about the law and what kevin and amy argue in the paper. the paper asks whether bulk collection and scanning by the government is illegal.
the answer they have is yes. it is illegal both under the constitutional requirements of the fourth amendment, which grant to all of as reasonable expectation of privacy. in this case, confidentiality of our e-mail assessing smith v. maryland and a bunch of other important and some well-known, some lesser-known cases. they also talk about the federal wiretapping act. originally created to deal with the problem of phone tapping by government and private entities. the electronic communications privacy act. the ecpa has a lot of exceptions. the basic prohibition is it is illegal, both civilly and criminally, for anyone to intercept the contents of an tlek communicatielectric commun
using a device. police have to get a warrant. for warrantless wiretapping, warrantless monitoring, the legal question is whether the nsa is using a device, in this case the robot in room 641-a, to intercept the contents of an electronic communication. through a very careful, very important, and very sort of interesting close reading of the legal precedence, kevin and amy conclude not only is there interception of the contents of electronic communication within the statute and the relevant precedence of the supreme court and lower courts, but also there is a violation of something in which communications parties, senders and receivers of e-mail, have a reasonable expectation of
privacy. i want to take a step back. this is after all a robotics conference. the thesis of the paper is that robots are reading your e-mail. and we should care about it. i think whether or not robots are reading our mail depends quite importantly upon what actually is a robot and whether that matters within our definition of robots and what we want our definition of robots to do. the seminole definition of what is a robot presented here two years ago, and those eminent robo law scholars concluded after much analysis it displays
a mental agency but is not alive in the biological sense. a robot is embodied and it manipulates physical things in the world as distinct from a disembodied a.i. under the richards and smart definition, the robot in 641-a is not a robot at all unless, i suppose you could put arms and legs on it, but the activities are pure ly, even if it is in oe unit, it isn't technically a robot. my point in saying this is not
to promote my definition of a robot or pull a jurisdiction game and say this is a robot conference and you are not talking about a robot, get out. we could do that and go to the bar early, but it's a bit early for that. the reason i want to make the point is, whether or not it is a robot is an important question. how we define what a robot is depends upon what work, what legal work, what technical work, what policy work we want the definition of a robot to do. if we think there are a particular set of legal or social or technical problems that are roboty, that are worthy of separate treatment as robotics questions, we should define robot in a way that captures those problems so that we can deal with those problems
on their own terms. my personal view is this is not a robotics question in the way that self-driving cars or drones or other physical embodied things are robots. that isn't to say it isn't a tremendously important question. in fact, i think how we deal with algorithmic monitoring services and filtering services and sniffers is one of the most important digital liberties questions of our time. it's to kevin and amy's great credit they are confronting this question. why i quibble about whether it is a robot or not, i don't quibble about the fundamental importance of the question, both on a technical and fundamental legal/civil liberties question. the method they used to address the question is crunching cases.
they do, for the nonlawyers, they do a simply magnificent masterful job, not just in determining what the law is, but in marshalling cases. some which wouldn't appear to support their position. but much of the important scholarship to show an interesting original and nonobvious ways why our natural for many of us, that an algorithmic machine is illegal under the fourth amendment and under ecpha. i want to push on the correctness in my mind of their
conclusion. what if the law didn't say that? i share their ideologic commitments if we are bound by reasoning and looking at what the cases say and leaping from there entirely, we could get into a problem if it turns out the best reading of the law isn't the best reading of what we want the law to be. an example here, this smiley fellow is a guy called roger olmstead. he was a police officer who was the al capone of the west, the
largest bootlegger of the west and the largest employment of the puget sound region in the 1920s. he brought barrels of whiskey down canada. that's "the untouchables" where they do the same thing. olmstead was known to be a bootlegger. police installed a wiretap outside his house on a phone line. they found all sorts of evidence from the wiretap transcripts he was a massive bootlegger and he was convicted on the basis of those transcripts. and sentenced to a long prison term. he appealed to the supreme court arguing that the police should have had a warrant before they monitored his communications. the supreme court rejected the argument, engaging in the same kind of analysis that kevin and amy engage in here. they look as fourth amendment
law looked at the time, and previous to that, to notions of trespass. the fourth amendment talks about protecting people's persons, papers, houses and effects, not in that order, but tangible thin things, papers, persons, our homes. electronic communication and electric communication along the wires was none of those things when it was merely electrons flying on the telephone wire. and because there was no physical trespass into the homes, papers and houses and effects of roy olmstead, there was no search or seizure, therefore, there was no need for a warrant. and therefore, the evidence was admissible. it's essentially the same methodology kevin and amy use except those precedents were not as far reaching or maybe chief
justice taft didn't have the imagination and legal skills kevin and amy do. olmstead is best known by the dissent by justice brandeis who looked not only at the narrow focus on trespass but what should the fourth amendment protect? what does privacy mean? why does it matter? regardless of what the precedents say, why does it matter our phone calls be protected from government surveillance? that i think is the question that really we want to ask here.
not just why a question of privacy. practicing lawyers have to follow the trail of precedence because that is the practice of law. we could take a page from justice brandeis and ask what the questions are. if the paper is missing anything, that's what's missing from the paper. it talks about privacy and it talks about interception. we hear about the nfl, but what is missing in the middle is why for the unconvinced. i'm fully convinced. i love the paper. for the unconvinced, the people who might think that an automated reading or scanning of your e-mail, depending on how we define the practice going on. >> that's bad.
the thesis of my book and underlying article is surveillance is bad for two reasons. it's bad because it menaces our intellectual privacy. the privacy that is necessary when we are thinking reading, communicating with confidence, making sense of the world, making up our minds when we know somebody is watching or sharing half-baked ideas, but when we are privately making up our minds if we are being watched, we might not read the article. we might not wonder. we might be chilled to the mainstream, the inoffensive and boring. if we care in a free society and individuality and about freedom to engage in ideas, any idea no matter how dangerous, we need privacy in that context. that's the insight that
underlies the supreme court's adoption of that view in the famous cats case in the 1960s. it's that enormative statement why we should line up the precedents. if they don't line up this way, we should discard them or distinguish them and come up with better tools to protect the fundamental value that animates not only this paper but the work of kevin and amy in their day jobs at lawyers in the trenches protecting our civil liberties. which brings me to the final point. when we are trying to understand the new digital robotic world in ways familiar us to, we have to use metaphors. we have to use leaps that say
this is like that other thing. the example here, hold your horses is a good one. the one that runs through the paper is interception. there are others. even saying a computer is reading your e-mail is itself a metaphor. i will stop because i want a broad discussion on these measures. why we should craft the law to promote human values. metaphor analogies are tools just like law. we need to pick the metaphors because they do useful, normtive, political, ideological work for us. metaphors or tools and robots are tools, as well.
there is not natural of a particular metaphor, use of a particular metaphor or the use of a particular technology or technological development, whether it is robotic technologies or software a.i. what is most important in this area of the law is we need to work out in advance to the extent we can, the human problems we want to solve. and the human values we want to be sure we preserve in those solutions. we need to pick the right tools for the job to do that. whether those tools are screwdrivers, whether they are computers, whether they are robots, whether they are computer code or legal rules. my quibbling aside, i want to stress that kevin and amy have given us a very important paper and it's a testament to what a good paper it is and what good lawyers they are that their paper raises these essential and
criticalically important legal, technological and ultimately human problems. >> thanks, neil. i think i'll have a few comments and amy will have a few comments. so i think it's worthwhile very briefing summing up once genoa question the paper asks and what the answer is. what we describe is all the traffic going over the internet back bone getting copied into a network of secret rooms filled with these big commuters that are looking at all the e-mail and looking basically for a list of targets in the content of your e-mail, seeing if you are talking about one of their targets, and then if it sees and identifier that it's looking for, it saves that e-mail and sends it down another network to the internet. if it doesn't see that, it passes out a memory. the question, sort of a tree
falling in a forest type of question is, if it looks at your e-mail as doesn't see an identifier and doesn't store your e-mail, has your privacy been harmed? i don't think this is a philosophical or academic questions for a few reasons. first off because it's actually happening and it's a critical question. you might ask why does it matter? who cares what the absent to this is? it matters because it depends, and we are both practicing lawyers. i think neil's point about this being a focused paper is a fair criticism. we are litigators and we want to sue people. whether or not your privacy has been harmed, is whether or not you have standing to sue the nsa. if we can't articulate an argument why everyone whose bits passed through this machine have been harmed, yet we do not know whose e-mails have been selected to be looked at.
that puts is in a koftka-esque "catch-22" why we cannot sue the nsa. that is a problem for me. we first learned about this infrastructure from a whistle-blower from at&t mark klein who showed up at our door step in 2005. that was part of the impetuous for our lawsuits against nsa and at&t at that organization. a lot of these ideas have been knocking around since then. i also want to clarify the paper doesn't address whether or not this stuff is illegal. we are asking the threshold question whether or not this is an interception under the wiretap act or a search and seizure under the fourth amendment. it may be that the answer to those questions are yes but it is illegal because it satisfies this or that exception and is
reasonable under the fourth amendment or whatever. we didn't go into that because it would have been a longer paper. we are not writing a paper about nsa but whether automated scanning of e-mails violates privacy. we are simple country lawyers not philosophers. we are not coming at this as a philosophical question. we are coming at this -- speak for yourself -- yeah. for me at least, my best proxy, my best way of answering the question, does it violate privacy is looking to the laws that define when our privacy has been violated and answering the question based on that. i think that along with the pressure is one of the main reasons the paper is law focused. i do think there is room to do more about the particular harms of even automated surveillance. the one we address specifically in the paper, and we do this in part through story-telling, is
the particular danger of mass surveillance that has been enabled by automated surveillance. for those who haven't looked at the paper we step through a series of interludes describing the surveillance in a room and analogizing to millions of human beings sitting there reading everybody's e-mail. those humans are reading a lot of e-mails. they are not going to remember anything. like your doctor, they've seen everything. they are not going to be titilated in anything they see. if they don't see a keyword, they will shred it. i don't see how that is distinguishable having a robot do it. if they had an army of people reading our e-mail that would violate our privacy. that would be a search and seizure. we in part through story-telling are trying to draw the analogy and say basically, and this goes
to the legal argument in many ways, this automated process is not different from, but rather merely an agent of the humans who want to read your e-mail but can't do it because they don't have the capacity to read everyone's e-mails. these automated agents are not violating your privacy less. they are enabling humans to violate your privacy more scaling up to something massive that humans could never have done. like neil, i'm promote my own work. it's also the subject of a paper by myself called "tiny constables and the cost of surveillance, making sense out of u.s. v. jones, saying things that were expensive years ago are now cheap and easy. it used to take a team to follow you covertly.
now the government can follow thousands cents per day using their cell phones what that means for our privacy and the future of law. i think i've somewhat addressed some of the things neil brought up. amy? >> i think one of the questions neil brought up are we talking about robots, if not we should leave and drink. one of the early questions i heard does size robot matter? does it matter how big a robot is? is it molecularly small? that is an important question here. if you have, for example, i'm going to use more metaphors. if you had a team of humanoid robots opening letters and determining if they were passed on to the government, would you say those were robots. if you had robo dogs walking up
and down every street and heat-scanning houses to determine if they had heat emantaions that reminded the dog of a pot farm produced inside the house and sent back an alert to the local police station saying this house looks like they are growing pot, this house doesn't, this house does, that robo dog would be a robot. does it matter when you take the physical piece out of it and put it into a computer and have the same effects occurring? can this message be passed along? that's the robot interest we were getting to in this paper is that it is acting on something, whether or not it is a physical piece or a bunch of bytes that contain personal communications, that is still something important. then you asked me this yesterday, what if the law didn't go your way? yeah, but the law does go our way. it's an important question
because the law also doctor in shifts. cats was an important shift after olmstead where they recognized that test wouldn't work. that's when we moved to the reasonable expectation of privacy test. we saw another doctorurnal shift. we didn't leave olmstead behind. there is still a property interest that is implicated by the fourth amendment, but cats supplemented that. you have a reasonable expectation of privacy test and this property law test for whether aoccurred. whether a gps device was physically placed on the car. maybe in our new world it is time to shift away from the reasonable expectation of privacy test. because we have persist end surveillance in public places. nobody technically could even
argue nobody ever has a reasonable expectation of privacy anywhere. is that the future for the fourth amendment when you're spying on everybody all of the or not the dissents, the concurrenc concurrences, started to go that direction and started to look at the persistence of the surveillance and how much information is gathered and over how much time, and we're starting to see another doctrinal shift in that direction. so it's possible that we'll have to re-evaluate this under another test, but the great thing about our paper is we were able to determine under the current test and the current case law that a search has occurred and that a violation of fourth amendment has occurred. so even if we get a better test later on, we're already there. >> so let me say maybe three or four sentences and we'll start the queue. i suspect this is a question almost everyone the in the room has strong feelings about. one really doesn't need to be
sort of intimate with the microphone in order to project through the room. i think that's right. i really like amie's point about the letter-opening physical robots versus the software agents. i think that essentially we're in agreement. this was the problem in ol'ment stead. and the doctrine was a physical doctrine. the question is, well, when the physical trespass reading ones mailed by the physical police officers, tiny constables or full-size constables, whether we needed to adjust the task to take account of the change. but that, i think, is ultimately -- i think maybe my point of disagreement or at least the point that i want to push them on is why is that the case? and what values are served by changing the test? because the test, after all,
like a robot or like a software ai, is a tool. and simple country lawyers are not, i like that metaphor. though, they are sort of high-powered washington lit gators. there's some false modesty going on there. butter this litigators. what litigators have to do, even litigators that don't appear before jury, they have to tell a story. they have to tell a story which explains to the unconvinced. i don't need any convincing this is right. but if we were to roll out this argument, it will not be met with universal acclaim, either in the corridors, digital or physical, of the nsa or in the federal judiciary, which is ultimately the audience that has to be persuaded by these questions. i think as taft and bran dice diverged in olmstead based upon what values were important.
prevention from trespass or protection of privacy, intellectual privacy and communications. the doctrinal argument needs to be intertwined with a normative story, rooted in our legal traditions and human values and our constitution. absolutely. but that story is a necessary piece because just like software code, legal doctrine is malleable and can be constructed and used to build any sorts of things. but we want it to build good things. and in order to figure out what a good thing is, we need that political, ideological, normative story. and i think that's what many of the people on this side of the table and people who care about these issues have to explain to those who are either unconvinced or on the fence wanting to be convinced but not having heard the story that justifies that the change in test or the
interpretation of ambiguous doctrine in a way that protects this. i would also add, i think kevin is exactly right. the agency theory here is a tremendously significant legal innovation or discovery that they have found and told a good story of in the cases. so we're happy to take questions from the back queue. we're using the microphone in the back of the room. and again, general rules, if one can identify one's self, then we'll get cracking. yeah? >> steve wu again. i just wanted to thank you for your thought provoking paper. one of the things i've been thinking about -- i'll mention two things. one of the things i've been thinking about is generally the transition from physical to
digital. and how the law doesn't seem to have caught up. the example that i give is in the 1990s when i was really first thinking about the internet and i was trying to do quote/unquote computer law is that i saw some of these cases having to do with insurance coverage for the loss of some kind of data center. a claim was put in by the insured to seek compensation for not only the loss of the hardware but also the loss of the data. and of course, policies weren't very sophisticated at that time, but the courts basically said, well, you can recover for the loss of hardware, but data are intangible, and there are they're not covered by the policy. therefore, in the eyes of the insurance policy and the court, these data have no worth. this is all about the data. the hardware are commodities. but it's all about the data. and i think you're seeing is the same kind of thing with this transition from reading physical paper to reading people's e-mails. it's all about the data.
so, you know, that might be something to think about in terms of, you know, further refining your draft. the other thing i would give you a little bit of a practitioner's data point, which is what you're writing about has real difference in part because for the first time last week in a contract negotiation, which i'm trying to help negotiate an agreement for an internet-based service, a customer of the service wanted to impose a term on us saying that if we, my client, becomes aware of government surveillance that we have an obligation to notify the customer. i mean, mass surveillance, completely unconnected with legitimate anti-terrorism activity and focused on particular individuals. but mass surveillance that my customer or my client has an obligation to not only notify the customer but also to file a lawsuit to try to stop the mass
surveillance. you negotiation basically take on the nsa. i thought, i applaud the opposing counsel for coming up with the idea and jumping on an issue of topical importance, but on the other hand, it was quite a burden on my client. but yet, you're seeing something straight out of the news go into a contract negotiation. and so what, you know, if this program didn't exist, we wouldn't -- my client wouldn't be incurring these expenses. >> so i agree with you totally about the data versus hardware question. in fact, i was just in a conference in toronto where one of my fellow attendees had lost her laptop in the airport on the way to the conference. somebody had stolen it. and it had an entire chapter of her upcoming book on it that had not been saved elsewhere because she said she hadn't backed up. she was like, i've just lost it. we were talking about how there should be a repository for people who have stolen devices to upload the contents of that device because you're really
normally ready to give up the hardware if you can get back the data on it. just give me my data back and i won't file charges on the computer. >> i mean, on the first point about the law, it's a truism. the law isn't fast enough to keep up with technology. technology is changing much faster than our doctrine can keep up. luckily, in a lot of ways on a lot of these issues, we have ready metaphors, some of them simply physical metaphors like cyberspace, that help us grapple with these things. for example, on the issue of the electronic communications privacy act, this is a law that inadequate protects our data in the cloud. we have now for years been arguing, and i think it's a strong argument, that the data we store in the cloud is analogous and should be treated it the same way in terms of privacy protection as the data we store at home in our personal file cabinets.
i think we'll ultimately win that battle, but even with a ready metaphor, it's taken many, many years. i think we're lucky on this issue we have a bevy of ready physical metaphors from football interception to telephone switchboard operators to, you know, drug-sniffing dogs or we distinguish that as an analogy. and simply the idea of millions of people sitting there reading everyone's e-mail that we have some pretty strong, you know, arguments by analogy to make. what freaks me out is when the technology gets so weird that ready physical analogy, there are no ready physical analogies. we can barely keep up with the easy issues. i consider this to be actually one of the fairly easy issues. when things get really, really weird, such that there's no ready analogy to the physical world, that's when not only is law not keeping up, law is falling far, far, far behind. >> and then i'll just make one point on the contract negotiation. we set out in the beginning of
the paper two programs that are being operated by the nsa under one of their authorities. the program where they actually go to the providers and ask for information and then the backbone program that we tackle throughout the whole paper where they're just getting information off of the wires that make up the internet. and it's very hard for, i think, in many cases, the providers to know that the information taken off the backbone is being taken off. so you won't get that notice that the program is even happening given to the provider. but what i think that we're moving toward is actually a world where in contracts you have to secure our data as to the point that it cannot be picked up the wire in any readable format. and that's something that we're aware of that we're not necessarily looking at. there's a huge problem with authorized access and how much information they're getting and how much information is requesting from companies but also them just going around the company altogether and getting information off the backbone and what you need to do to make sure
that can't happen anymore, to make sure this can't happen anymore. >> very quickly on the first point about the physical to digital, i think the first part of your question answers the second, right. you said on the one hand, data has enormous value. then you said, but securing data is costly. i think the fact that data has value perhaps justifies -- maybe not canaries for everyone and the obligation to file lawsuit, but wow, what a fantastic legal rule that would be, at least from my perspective. i think it's -- the fact that data does create all this value but also creates risks to the companies but also to the users whose data is being safeguarded, i think actually does cancel itself out to some extent and argue that it's actually okay to impose reasonable obligation of privacy and security on prooif entities. also, it shows how this is not just a government problem or a government versus citizens
problem. the intermediaries are an important part of the puzzle. on the metaphors, you know, we can call it a robot here, we can call it an agent. we can call it a device. the other example kevin used, we can call it the cloud, which sounds very airy and puffy. we could also call is the vault or the data locker. compare icloud to dropbox. the various senses that conotes about security. my overriding point today is that the choice of those matters and the choice is important and the choice is natural and we should make those choices consciously, not because we've been using the metaphor before, but because the metaphor helps us to capture that the human and legal and social values that are at stake and we cannot let our metaphors get in the way of our values, even well-worn metaphors that are easier and require less cognitive load to follow down the path. path probably being itself a metaphor as well.
>> hi. so i loved this paper. i especially loved, amie, your take on the reasonable expectation of privacy and your comments just a minute ago, when you said the test should just be chucked because it's not very good. i would tend to agree with you. a lot of the reason i agree with you is the fact we just can't decide what the term privacy actually means. if it means anything. so on that point, i actually would like to pick up on what neil said, which is it's important to create a story. and it's important to create a narrative. although i know you said you're litigators and that's not what you're actually going to do, i think you may have the beginnings of a very interesting narrative that i haven't seen played out yet. i wonder if you could draw upon that a little more. so one of the big problems with privacy is we don't know what it means, and you can define it seven different ways. but one of the more popular ways we define privacy is the right to control information and is this idea of control.
but of course, that doesn't work when we're talking about surveillance because you've already lost control the moment you hit send. so we say, okay, well, that doesn't account for surveillance because surveillance isn't really an issue about controlling information. at least when we're talking about e-mails traveling along the lines because it's picked up along the way. you know, there's control lost. then your information is traveling along. then the privacy harm happens. but talking about the metaphor of the nfl, which i really loved and it was very intuitive to me, i wonder if the story that you're creating here is that the harm from surveillance actually occurs when control is gained by another. so not loss of control, but rather another's gaining of control. that's really what enables the harm here. and it allows us to talk about privacy harms in a certain type of way, a way in which neil has described in his work. the resulting power disparities that creates. one of the ways in which the
power disparities are created is when another, third party, gains control of information. so i wonder what you think about that and if that's maybe a way you could then flesh out this theory a little more to put some scaffolding around it. >> do you want to start? >> yes to all of that. i mean, clearly one of the overall themes in the paper when we step through at least the interception, you know, the statutory analysis and fourth amendment seizure analysis is in some ways the robots are irrelevant. the real moment for, you know, when an interception occurred or when the seizure occurred was when the government gained control of a copy of your communications, such that you no longer had the ability to decide how it was disposed of and it was taken out of the regular transmission path, you know, and someone other than the intended recipient gained control of those bits. and the metaphor we used that
you mentioned was an interception in football. the ball is intercepted. the moment that happens, the other team has gained possession. you lost possession. it may behe fumbled it immediately afterwards, he takes a knee or gets to the end zone and gets a touchdown. whatever happens after that moment is irrelevant to the fact that it was intercepted. and so this does also reflect a theme that you see in work like neil's or like paul ohm's recent privacy in a -- the fourth amendment in a world without privacy. and something you're seeing in discussions around big data now and the white house process, that we're moving away from discussions of privacy and moving more toward discussions of power. and how data and access to data and imbalances in access to our control of data effectuate power relationships. and in a way, this ultimately
goes back to my cocktail party version of my answer to the question of, why should i care about surveillance? i don't care if, like, the nsa has a copy of, you know, the recipe that my grandma sent me or whatever. and my answer to that question is always, well, it's not about you, you narcissist. like, it has nothing to do with you individually or whether you feel creeped out or violated. it has to do with maintaining the conditions for a democratic society. and if we live in a society where those already with power also have the power to automatedly look at all of our private communications to see if there's anything that's interesting to me that might, say, threaten their power, that's much bigger than a privacy question and certainly much bigger than a question about whether you feel personally violated, which frankly i don't care that much about. that's going to come back to haunt me. >> so just to bolster everything that i agree with that kevin
just said, we spent a long time -- oh, the computer went black. we spent a long time looking at the diagram that used to be behind me and trying to figure out when it -- when the privacy harm occurred and what the privacy harm was. there's a very long discussion, i think, about harm that we tried to work in and we're going to continue to try to work into this paper. eventually, we came up with it occurs at the point the communication is originally diverted. it doesn't matter what happens in the box. it was that one point because that's when no matter -- regardless of if they discard it, regardless if they keep it, they now have the decision to make -- the robot has the decision to make about what to do. they have put it into the robot and now the control has been taken away from the person. so the moment it has been diverted off the path that it was intended to go on. a harm has occurred no matter what. >> i think there's a great point. i agree with everything kevin
and amie have said. but one thing kevin said, if the robots are irrelevant, then maybe -- i think if they're irrelevant to the story, maybe they should fall out. i love the title. >> irrelevant to the search analysis. >> they're certainly relevant to getting the paper before this great conference. i'm glad they did because we all get to hang out with them and read their work and argue about this stuff. but -- >> i will say there's another hypo in the paper that raises the same issues but indisputably involves a robot, which is one that amie mentioned, although she mentioned it as dogs. imagine self-driving cars that are driving around the neighborhood. >> i mix metaphors. >> driving around the neighborhood doing heat sensing on the houses to try and detect marijuana grow operations. the supreme court has nund doing that type of scanning is a search of the house. and i think that metaphor, which is a different hypo from the nsa hypo but raises the exact
same issues sort of demonstrates that the robots aren't necessarily irrelevant. the robots are perhaps less relevant to the hypo we chose but perhaps is very timely. >> i would say they're all agents. that's the power of this paper. it's the agency theory. that is a story. and i think it's a really powerful one. and it ties in nicely with, you know, neutral -- sort of existing, neutral legal rules. on the nfl metaphor, i like it, but i like sports and i like football. and, you know -- but we have to be careful. it might work for the interception part, but we can't let fourth amendment law be sidetracked by the nfl, right. because -- i'm english, but if there's defensive encroachment -- >> you can call it american football. >> as opposed to real football. if there is encroachment by a defensive lineman before the snap, there's an interception, but the play is called back when
it's declined afterwards by the offensive team, which is complicated. but the point s we can't let the nfl-ness and the coolness of the metaphor imprison our thought. it's useful for the point they use it in the paper, but we need to stop and say no more nfl because we're doing privacy law and civil liberties law and democratic society power law, not football law. >> michael from the university of miami school of law. i'm going ask you guys to speculate about legal doctrine because one of you is a great expert, and the others are not only experts but inside the beltway. in order to set up a doctrinal point, i have to set up a slight detour. the case you're talking about, the heat sensing case is a very funny case because a key point of it is a reasonable expectation of privacy based on the idea that most people don't have heat sensors. right. if heat sensors were built into the iphone that, case wouldn't
hold there's a reasonable expectation anymore. one of the great achievements of your paper, which i love s that it puts agency law right at the heart of the surveillance -- mechanical surveillance problem. in a sense, the elevator pitch for 50% of your paper is we take the action of the agent, attribute it to the person and treat them like the person. and that gets us where you and i want to go so long as there's a reasonable expectation of privacy as regards the action of the person. the question i want to ask you to speculate about is how -- so that's really using agency law as a shield. the question i have is, can we use agency law as a sword? this gets to something amie was talking about briefly before. how can we deal with situations where there is no expectation? that's important because to the extent we have this one-way ratchet and supreme court doctrine where as technology becomes more common, the zone of our reasonable expectation shrinks and shrinks and might some day be zero.
the shield might not be enough. the shield is temporary. we may need the sword. so given the door's been a little open by jones and other recent cases, how can we -- is there a way we can use this agency idea to fix things, third party doctrine, banks, whatever, and the reason why this question seems to me so hard is that if i wanted tomorrow to open up a privacy bank that gave you a contract that to the maximum extent permissible by law protected your rights and therefore gave you more reasonable expectations of privacy, i couldn't actually give you much more than my bank gives me now because of the world of law and regulation in which banks are meshed and controls what they can offer me. i think the same thing is to a certain extent true in communications and lots of other infrastructure we've built. so it's not enough, i worry, merely to take your idea and try to turn it into a sword. we then run up against all these other problems as well.
what do we do? >> what do we do? so i have a few thoughts on that. just so -- i don't want to ask you, but i'm a little confused about why this isn't simply a question about how do we address reasonable expectation of pro f privacy? i'm not quite seeing the linkage. >> as i understood the paper, right, the agency theory gets its power because if the principal had done this thing, it would have been a violation of our reasonable expectations of privacy. if there had been no reasonable expectation of privacy on the part of what the principal had done, there's no problem with using the agent to do the same thing. am i misunderstanding that? >> no. >> so what about, you know -- but the problem is that as republican expectation -- you could say, i suppose it is an answer, we need to put more life back into reasonable expectation. the trouble is, it's very tough. we're in a world where worlds have meaning and metaphors work.
>> so there's an interesting -- there are a number of really interesting things we can talk about here. on the just sort of general reasonable expectation of privacy question, you know, i share your concern. we have seen through jones a few alternate paths to ways that increases in technological capacity can strengthen our reasonable expectation of privacy rather than diminish it if. in jones, the supreme court held the 28 days of gps tracking of a vehicle on public roads, was a search, did violate a reasonable expectation of privacy even though that information was exposed to the public. and that shorter term or technologically unassisted tracking would not have violated reasonable expectation of privacy. five of the justices in that case actually held that it was the tracking that was the violation, not the attachment device. so that shows there is a concern on the supreme court, and there are five justices on the supreme court that believe even just using technology advocating information that was public
could violate your protection privacy. in that way, increases in capacity to surveil us could give us more protection than we had in a way as a counterbalance to increases in capacity could make what was a search no longer a search. on the agency question, there is a really interesting double-edged sword here, and we wanted to address it in the paper. we didn't have time. we cycled a paper by toxin who, in the fourth amendment context, he argued that it shouldn't count if a robot reads your e-mail from a fourth amendment perspective in part that he feared if it doesn't count that should eliminate the protection of privacy. that is, to the extent we have a
lot of robots looking at our e-mail to scan it for viruses or to service ads or whatever, if that counts and we've agreed to that or otherwise have allowed that, that could mean we have given up our overall interpretation of privacy in those communications. i fear that toxin was killing the fourth amendment to save it. i think i'm more concerned about the parables that come from government surveillance than private surveillance and i think our allowing that kind of behavior does not eliminate protection of privacy, and we have enough cases saying that that i feel comfortable. but it's not that easy. it gets to the automation rationale which is the case where smithfield, maryland said we do not have enough cases to judge. i think this goes to age bias as much as anything else. they said, human operators used to connect our calls, and the
fact the phone companies have automated that process doesn't change the fact we have exposed that information to the phone company. we pivot that and use that to our advantage in the paper and say, well, if it's good for the goose, it's good for the gander. the fact the government is auto mating this reading doesn't make it less of an advantage. >> that's right, and i think another way of sort of restating this or maybe adding a bit to it that kelly and andy could answer the question is that we agree with you, neil and michael and woody, that the real genius of our paper is not the use of the word robots in the title but is the use of the word agent. because we talk about the national security agency and that national security agency has agents, and some of them are
human beings and some of them are software agents. maybe some of them are scary robots, too. and those agents follow out the wishes of the principal, and it doesn't matter whether those wishes are accomplished through a software agent or a human agent or a scary killer robot agent. what matters is that the agency is happening. and the will of the principal is being affectuated through one of its agents. when michael said i don't have any privacy anymore because everything is being tracked, there is something that says we respect an expectation of privacy that people have, subjective, and also one that people accept as reasonable in an inquiry. if there isn't an expectation anymore, privacy goes away. there are two things we can do. junk the perspective entirely, which i think we can do, and when it comes to objective
reasonableness, we should look to lawyers. lawyers, doctors, priests or librarians or psychotherapists, anybody who has a professional duty of confidentiality. when you trust someone with your data, your lawyer, let's say, this might be publicly known information but they are under a duty as your agent not to disclose under any circumstances. it doesn't matter whether the person asked the question knows what's going on, it doesn't matter really anything, and that's the way the agency can be used as a sword, that it can protect confidences, it can protect sharing. ironically enough so that sharing can take place.
litigation when you may finally get this critical piece of evidence that was acquired by violating the privacy kicked out of the lawsuit, but the person has basically been dragged through the mud in the public eye? >> i won't speak for kevin because he'll noriel at me, but i get this privacy dead question a lot, like do people not care about this anymore? my experience is if they don't care, they don't know. to the extent they do, i agree with kevin on his point earlier that quit being a narcissist. but also because you talked about a multi-year litigation, i just had to go through this with my sister who lives in florida and had to be told her facebook messages could be subpoenaed,
even her private messages. and she had no idea, which is an interesting place to put someone when they start thinking about what is private and what is public. you have to put it in context, is that people may give up their privacy but they give it up contextually and they don't understand that information can leave the context that you put it into. so i think there are a lot of psychological pieces that go into that that go outside the law, and lawyers are used to thinking of it in very rigid, specific instances and not really the way you think about it in everyday life. >> kevin is right, it's you will about power. but it's all about power on the consumer expectation, too. the reason papers are in the fourth amendment wasn't because people were concerned about the government rummaging through
their things, but they were rummaging through their things to find diaries or letters or evidence that could be used to punish or haul people in courts on charges of treason because it was very much a public liberty. i think that's part of the argument as well, but it's an argument that we should care about the fourth amendment because we care about a government society. this might be controversial, it might be wrong, but i'll say it, anyway. it's more important to have a government society than to have free ice cream. on the commercial side, it's also a question of power. amy is exactly right, it's a question of limited choices. it's a question of knowledge and information. where we have that elsewhere in the consumer context, we regulate it. that might be practically difficult to accomplish, but that's the answer, and i think that's the story we need to tell. these are all about stories.
>> i just want to know if somebody from microsoft and google are here giving out ice cream. >> i want my ice cream. >> first of all, you two are my favorite country lawyers. or at least kevin is, i'm not sure amy is from the country. she said she is. i think you should use that perspective actually more. i'm going to push back against neal. >> the litigator perspective? >> yeah. actually, your uniquely situated for the litigator perspective. kevin, something you said earlier struck me which is this is all about trying to get these issues into court. i looked to see if amnesty is included, and i couldn't find it. if this is about power, which i agree it is, the very complex series of hurdles that you have to overcome to even get to the question -- >> that's a lot of series. >> right, but if you're about power, this is like that last piece in all the other pieces of the system, which i think is a
really important part of it. >> i'm just here to control neal because i'm still mad at him for saying we should treat robots like hammers and screwdrivers two years ago. i completely agree with you, neil, that the real argument here is agents, right, and not robots and that it's intellectually dishonest to use the word robot in this context. i agree with that, but we've talked so much about how people perceive robots as agents and how we have these completely unrealistic expectations from science fiction, and it just sounds so different. a robot is reading your e-mail versus your e-mails being automatically scanned, and so if we're talking about getting people to care about privacy
and, you know -- i don't know, i'm just trolling, basically, but if you had to choose between being intellectually honest and actually getting people to care about these issues, which would you pick? [ laughter ] >> that's directed at neil. based on this wikipedia entry i just edited, what we're talking about, they are robots. they're certainly bots. would taking the "ro" off make people happy? >> so when did i stop beating my wife is the loaded question you're asking me. i don't think it's intellectually dishonest to call it robots, and i want to be clear because that was one of my critiques of kevin on this paper. i don't think it's intellectually dishonest. i think using the word agent is better. my concern about using -- at a
tactical level using robots to get people to care is we may get people to care about the privacy issue, but then we create this whole anthropomorphic level, and we create a huge robotics problem with the anthropomorphic problems that the people yesterday were talking about. when i say robots are hammers -- metaphors are hammers, too, and hammers are good. we should just be clear that these are human construction tools. hammer is probably a colorful way of expressing it. toasters are even a more metamorphic way of expressing it. all of us are engineers and we just want to build good things. we can argue what good is, but ultimately that's all we have to realize.
there is no mystery to this, it's just hard. that's why we're here. >> thank you all very much. i have two quick announcements. the first is we have t-shirts for sale out front. if you want them they have the wonderful symbol of rosie the roboter. and this is the last chance to sign up for car action at the airport if you need that. having done that, i now have the fun part of thanking you for joining this wonderful panel. it was a great panel. [applause] >> thank you. >> we'll see you in 15 minutes sharp.
earlier today at the united nations, the security council met on the downing of the malaysian airliner over ukraine yesterday. the u.s. ambassador to the united nations, samantha power, had this to say. >> yesterday we were all shocked by the downing of malaysian airlines flight 17. all 298 people aboard, 283 passengers and 15 crew, were killed. as we stared at the passenger lists yesterday, we saw next to three of the passengers' names a capital "i." as we now know, the letter "i" stands for infant. to the families and friends of the victims, it is impossible to find words to express our condolences. we can only commit to you that we will not rest until we find
out what happened. a full, credible, and unimpeded international investigation must begin immediately. the perpetrators must be brought to justice. they must not be sheltered by any member state of the united natio nations. let me share with you our assessment of the evidence so far. we assess malaysian airlines flight 17 carrying these 298 people from amsterdam to kuala lumpur was likely downed by a surface-to-air missile, an as-11, operated from a separatist-held location in eastern ukraine. the airliner was traveling at a kuz altitude of 33,000 feet and its speed was typical for an airliner along an established flight corridor frequented by commercial traffic. the flight was transmitting its assigned transponder code corresponding with its flight
plan and flight tracking data was publicly available on the internet. there was nothing threatening or provocative about mh-17. of the operational s.a.m. systems located near the border, only the sa-11, sa-20, and sa-22 s.a.m. systems are capable of hitting an aircraft at this flight's altitude of 33,000 feet. we can rule out shorter-range s.a.m.s known to be in separatist hands including sa-13 systems which are not capable of hitting an aircraft at this altitude. early thursday an sa-11 s.a.m. system was reported by a western reporter and separatists were spotted hours before the incident with an sa-11 system at a location close to the site where the plane came down. separatists initially claimed responsibility for shooting down
a military transport plane and posted videos that are now being connected to the malaysian airlines crash. separatist leaders also boasted on social media about shooting down a plane but later deleted these messages. because of the technical complexity of the sa-11, it is unlikely the separatists could effectively operate the system without assistance from knowledgeable personnel, thus we cannot rule out technical assistance from russian personnel in operating the systems. the ukrainians do have sa-11 systems in their inventory. however, we are not aware of any ukrainian s.a.m. systems in the area of the shoot down and more importantly, since the beginning of this crisis, ukrainian air defenses have not fired a single missile despite several alleged violations of their air space by russian aircraft. this also follows a pattern of actions by russian-backed separatists. on june 13th, separatists shot
down a ukrainian transport plane carrying 40 paratroopers and nine crew. on june 24th, as this council was meeting to welcome ukraine's unilateral cease-fire, we received word that separatists downed a ukrainian helicopter, killing all nine on board. on july 14th, separatists claimed credit for the downing of a ukrainian military cargo plane flying at 6,000 meters and on july 16th, they claimed krel credit for the downing of a ukrainian fighter jet. if indeed russian-backed separatists were behind this attack on a civilian airliner, they and their backers would have good reason to cover up evidence of their crime. thus, it is extremely important that an investigation be commenced immediately. in the first instance, the osce special monitoring mission should act as a first responder, laying the foundation for efforts by other international organizations and individual nations, including those whose citizens were victims of this tragedy. yesterday president obama
assured ukraine's president poroshenko that u.s. experts will offer all possible assistance upon his request. president poroshenko has invited the independent and credible international civil aviation organization to join in investigation. international investigators must be granted immediate, fushlgs and unfettered access to the crash site. all those concerned, russia, pro-russian separatists, and ukraine should agree to support an immediate cease-fire to facilitate access by international investigators. in this regard, we look to the smm, also to reach agreement with separatists and others in the region to make this possible. all evidence must remain undisturbed, and any evidence removed from the site by the russian-backed separatists operating in the area should be promptly returned and handed over. russia needs to help make this happen. >> we're asking for your comments on the investigation into the shootdown of a malaysian airliner in ukraine. you can reach us through twitter at the hash tag #cspan.
patricia writes, malaysia has a lot to answer for. they were flying over a war zone, even though all planes had been warned off. and eleanor says, no passenger jet should ever be shot out of the sky for any reason. they are not at war, this was a total tragedy, and it should never have happened. 40 years ago, the watergate scandal led to the only resignation of an american president. throughout this month and early august, american history tv revisits 1974 and the final weeks of the nixon administration. this weekend opening statements from the house judiciary committee as members consider articles of impeachment against president nixon. >> selection of the president up as a very unique position within our political system. it's the one act in which the entire country participates and the result is binding upon all of the states for four years.
the outcome's accepted, the occupant of that office stands a a symbol of our national unity and commitment. so if the judgment of the people is to be reversed, if the majority will is to be undone f that symbol is to be replaced through the action of the elected representatives, then it must be for substantial and not trivial offenses, supported by facts and not but surmise. >> watergate, 40 years later, sunday night at 8:00 eastern on american history tv on c-span3. with live coverage of the u.s. house on c-span and the senate on c-span2, here on c-span3, we complement that coverage by showing you the most relevant congressional hearings and public affairs events. then on weekends, c-span3 is the home to american history tv with programs that tell our nation's storyics including six unique series. the civil war's 150th anniversary, visiting battlefields and key events. american artifact, touring museums and historic sites to
discover what our if i tacts reveal about america's past. history bookshelf with the best known american history writers. the presidency, looking at the policies and legacies of our nation's commanders in chief. lectures in history with top college professors delving into america's past. and our new series reel america featuring archival government and educational films from the 1930s through the '70s. c-span3, created by the cable tv industry and funded by your local cable or satellite provider. watch us in hd, like us on facebook, and follow us on twitter. three whistleblowers from the veterans benefits administration testified tuesday before the house veterans affairs committee on misappropriations, misconduct, and retaliation for reporting wrongdoing in the department relating to wait times for veterans to receive medical care. they called the problems in the veterans administration systemic and a culture of corruption, where management, bully, and
harszed workers who report mismanagement. >> good evening, even. welcome to tonight's hearing. we're going to be reviewing the veterans benefit administration's 2015 goals for disability benefit claims processing as well as the viability of those targets, which the former secretary established several years ago at 125 days to complete and 98% accuracy on the claims. we're going to delve into the actions that vba has taken and its singular focus to declare victory on disability claims in 2015, and we will endeavor to determine what price is being paid by our veterans, by the employees, the human capital of the regional offices, and by the
american taxpayers. we have spent significant time on veterans health in recent weeks and have exposed the rampant corruption and dishonesty, the bullying, and the retaliation, the corrosive culture and the workplace fear that has flourished within the administration. now we look to vba and seek answers on its part in creating the same, the very same environment that we've already heard about within its ranks. i received correspondence from a vba employee who is with us tonight who wrote, and i quote, here are excerpts from the report by the white house deputy chief of staff rob neighbors detailing, one, the vha's 14-day scheduling is standard and arbitrary, two, the vha needs to be restructured, it looks a transparency or accountability in its management. and three, a corrosive culture has led to personnel problems, highlighting poor management, distrust between va employees
and management and a history of retaliation towards employee raising issues. the employee then stated in the letter, quote, if vha is replaced by vba and 14 days is replaced by zero claims over 125 days and 98% accuracy, these excerpts from the report apply equally to the vba, end quote. to determine the scope of this statement at the end of last week, the committee asked afge to inquire whether employees nationally agreed or disagreed with this sentiment. and in less than two days, fast responses were received from 18 regional offices. not one regional office employee responded in disagreement. in fact, 16 ros agreed on equivocally. let that sink in. vba is still running guns
blazing on this questionable path without a real plan, without a real change. so let's begin tonight by reminding everyone again of vba's real mission. and it is, quote, to provide benefits and services to veterans and their families and a responsive, timely, and compassionate manner, end quote. you've seen the perverse consequence of the mixed metric goals within the veteran health administration. and tonight we're going to look at vba's targets. and we will hear what's being done to push claims out the door. out the door at any cost. 125 days and 98% claim-based accuracy would be a laudable goal if it were at all realistic. weeks before tonight's hearing, we began asking vba to provide this committee with information on the research and analysis that was conducted prior to setting this goal as well as its information on performance standards. vba has declined to provide
timely and complete responses, and in fact, we just got an e-mail a couple of hours before this hearing. the purported responses failed to fully answer the questions that have been asked, and we're going to discuss that again later. the vba's 2015 goals were outcomes directed by the then-secretary of veterans affairs to make progress. they were a call to action. and however well intentioned, they have now become a distraction from accomplishing true progress. employees have been working for a year on a 20-hour per month mandatory overtime schedule with no end in sight. in fact, we know that vba has not ruled out actually increasing the 20-hour overtime mandate. we're going to hear from gao later about how 75% of the regional offices that they surveyed have agreements with the local unions that all veterans disability claims work
done on this candle burning overtime shall be exempt from any quality review. i look forward to hearing from vba on how that's being sold as a veteran-friendly practice. now, essentially, it's the equivalent of saying, just make a decision and we'll hope that the veteran doesn't appeal. chronic incidents of unchecked, oppressive, and vindictive management festers within many of the regional offices. and the honest input of expert va employees has been violenced, ignored, and at times punished. i'm told that the performance requirements on production and accuracy have been weaponized, if you will, to keep vba employees in check. to what end? it's certainly not in the name of service to america's veterans. it is, instead, to create an appearance of success. just as vha attempted to do by
cooking the books on scheduling times and notifications involving disease. the va office of inspector general will testify to the potential of over $1.3 billion in improper payments. the oldest claims initiative, a push that required all claims that were two years old or older to be rated within 60 days, introduced a scheme called provisional ratings. this was another hard and fast deadline dictated by central office and vba promised, don't worry, we'll get them done right. they won't be going out the door without service treatment records, without medical exams, if that's necessary. so what was found at the regional office? guidance that read, and i quote, a new va exam request will have a negative impact on our ability to meet the goal that has been
mandated by our leadership, end quote. so vba employees were directed to move forward with the evidence of file, even if a medical exam was necessary to decide these ageing claims. contained in the guidance, and i ask you to look at the screen and members, you should have this at your desk, i quote, from an e-mail where it says, i understand this may be difficult to do and may appear to go against the values of how we do work, end quote. quote, i want to assure you that -- and here it is typed in boldfaces -- there will be no negative consequences for you, the employees, as a result of following this guidance. the only possible negative consequences are those that exist if we fail to meet our goals for this project and for
any actions that keep us from doing so, end quote. vaoig's report issued earlier today stated staff incorrectly processed 83% of the provisional rating decisions that were reviewed. who is paying the price for vba's self-defined success? there are roughly 280,000 veterans languishing in three, four, and five years of an appellate backlog. and nearly 240,000 veterans waiting on dependency award adjustments. we then have the complicated case, the old cases, which were lost and then were subsequently found under a contrived and disingenuous interpretation of vba's guidance of may 20th of 2013. even more egregious, vba has recently put out guidance to the regional offices that, unless a
veteran puts specific words on their claim form, a form that doesn't provide any space for comment, that the claim condition has existed, that the claimed condition has existed, quote, since service, then a medical exam will not be ordered, and the claim will be denied. denied. robert gates, former secretary of defense, recently released his memoir entitled "duty" which he dedicated to the men and women of the united states armed forces. he writes about va and about his dealings with a former va secretary. the secretary notes, i was staggered when he said his department was in good shape and had no problems, and he continued, i'd be around long enough to know that when a head of a department says his organization has no problems, he's either lying or he's delusional. so i'll close my remarks by
speaking to vba directly. whatever hooray you shout, whatever win you take credit for be celebrated. it has been made clear that there is not a corner of vba leadership that will not cut nor a statistic they will not manipulate to lay claim to a hollow victory. what we all want to see, both my republican and democrat colleagues on this committee, is progress, not deception. with that, i now recognize the ranking member, mr. michaud, for his opening statement. >> thank you very much, mr. chairman, for having this hearing this evening. tonight, we will have an opportunity to continue an important discussion we have touched upon in several of our previous oversight hearings, the veterans benefits administration and their progress in reaching goals related to the claims
backlog. with the scandals at the veterans health administration weighing heavily on us, tonight the committee wants to assess the current state of play at the vba. the agency appears to be making some progress on its goals of eliminating claims backlog by the end of 2015. i do, however, have concerns in the vaoig shares the concern that the resources needed to achieve va's backlog goals are being directed and applied disproportionately ultimately harming other veterans services. i refer in particular to non-rating workload, quick start, benefits delivery at discharge, independent disability evaluation system and appeals, to name a few. we have heard over and over again of the dangers and failures of a system geared toward defining success based on narrow, fixed metrics.
that is not how good customer service is delivered and it is not how our veterans perceive success. and why should they? what good is it for a veteran if vba process his or her rating in an unacceptable period of time, but then takes years to add a dependent. from july 2010 to july 2014, the number of backlog dependency claims cases have gone from 9,367 to 192,322. this represents a nearly 2,000% increase. since march of last year, the number of pending appeals has gone up 12% and continues to increase. and there are personnel issues as well. we have heard reports of an unacceptable practices and challenges at many va
facilities. at the baltimore va regional office, the oig found that as many as 9,500 documents, including claims, claims-related mail, and various other documents containing personal identifiable information have been improperly stored. lax measures and practices with records to veterans' personal information is simply unacceptable. again, to me, this says va's focus on narrow performance measures are not realistic for defining success. veterans define good timely care and services on their whole experience from start to finish. that's what makes sense. and it's something we must confront in today's hearing and in the larger term as we continue on our important work to reform the va. the department of veterans affairs cannot morally claim success in delivering better care to our veterans by touting
their progress on the backlog if that progress has come at the expense of delivering other key services to veterans in a timely manner. this work takes an increased urgency as more and more veterans are coming home from service abroad in operation iraqi freedom and operation enduring freedom. to fix the current shortcomings in the delivery of service, we need all of the facts, and we need honesty, frank discussions. that's what i'm hoping to get out of tonight's hearing, because if we do not base our reform efforts based upon what is realistically achievable and what the facts are, we are setting the department of veterans administration and more importantly, our veterans, up for failure down the road once again. and i think we can all agree that this is not an option. so tonight, mr. chairman, i appreciate your calling this hearing because it gives us a
chance to take a hard look at what vba needs to do to ensure that it is providing its claims work force with the training and other tools needed to deliver timely and accurate benefits to our nation's veterans and their families in all areas of their responsibility. so i want to thank you, mr. chairman. i yield back the balance of my time. >> thank you very much, mr. michaud. i would ask that all members would, as the committee's custom, waive their opening remarks and i would also ask unanimous consent of the committee that we allow some of our colleagues to join us here tonight from the eighth district of pennsylvania, congressman michael fitzpatrick and from the seventh district of pennsylvania, congressman patrick mckeehan and we may be joined by other colleagues later. hearing no objection, so ordered. tonight, we will hear from two panels. the first is comprised of individuals from various vba regional offices to include miss kristen rule, authorization
quality services representative of the pension management center at the philadelphia regional office, mr. ronald robinson, veterans service representative and member of afge local 520 of the columbia, south carolina regional office, and mr. javier soto who served as a rating veteran service representative and the executive vice president of local afge 1594 in my home state, the great state of florida, under the supervision of the st. petersburg regional office. the second panel we're going to have will contain government witness in the following order. miss linda holliday, assistant inspector general for audits and evaluations office of the inspector general, miss holliday is accompanied by mr. brent arronte, director of san diego benefits inspections division office of audits and evaluation. next will be vba to include the honorable allison a. hickey undersecretary for benefits and she is accompanied by miss diana
rubens, director of the philadelphia regional office, who is the former deputy undersecretary for field operations as well as mr. thomas murphy, director of compensation service and finally, we will hear from mr. daniel bertone, director education work force and income security with the u.s. government accountability office. so i now acknowledge our first panel who is already seated, yield to our colleague, mr. fitzpatrick for a brief introduction of our first witness. >> i would like to thank the chairman, the ranking member for the opportunity to participate in the hearing and to introduce miss kristen rule. miss rule is a law school graduate, practicing attorney, commonwealth of pennsylvania, and a former law clerk of the pennsylvania supreme court. miss rule works as a quality review specialist at the philadelphia regional office which serves tens of thousands of veterans in my community and hundreds of thousands in the greater region and throughout the country. she is a strong supporter of veterans and has been reporting various types of data
manipulation and illegal payments to anyone who would listen. unfortunately, the va was not listening to her and that brings us to this evening's hearing. in 2012, ms. rule, frustrated that the va was not responsive, reached out to my office for help. i was inspired by her doggedness and desire to make the va a better organization, honored to work with her to help to get to the bottom of this. so now, mr. chairman, this evening, with this committee and america as her audience, miss rule will tell her story of what can be described as no less than gross mismanagement at the philadelphia regional office. and i appreciate her courage in coming forward and her patriotism in doing so. i yield back. >> thank you very much to our colleague, mr. fitzpatrick. we appreciate you being here with us tonight to introduce your constituent. i would ask that all the witnesses would please rise and raise your right hand. do you solemnly swear under penalty of perjury that the testimony you are about to provide is the truth, the whole truth and nothing but the truth?
thank you. you can be seated. each of your complete written statements will be made a part of the hearing record for tonight. miss rule, you are recognized for five minutes. >> my name is kristen rule. i have worked for the department of veterans affairs since august of 2007. i work at the philadelphia regional office as an authorization and quality review specialist. i possess a law degree and have previously clerked for the pennsylvania supreme court. mr. chairman, committee members, veterans and guests, i have been identified as a whistle blower. i started reporting various types of data manipulation and illegal payments and glitches in the operating system, a system that is responsible for paying out va benefits since july of 2010. i discussed what i perceived as gross mismanagement at the philadelphia regional office. i raised many issues, including but not limited to the proper -- improper shredding of military mail, beneficiaries receiving improper and/or duplicate payments, illegal processes with the recovery of funds after an
improper payment has been made and not returned, data manipulation, and various other gross misinterpretations of the law. instead of solving problems, i was and continue to be retaliated against by the va. i have been targeted by middle and upper management at the va for over four years, despite the fact that oig recently confirmed these allegations as will be reflected in their testimony for today. the va's problems are a result of morally bankrupt managers that through time and grade have moved up into powerful positions where they have the power to and continue to ruin people's lives. i can speak from experience. i do not believe in manipulating data to achieve monetary gain for myself while harming the veterans and their survivors. in 2013, the va issued fast letter 1310 regarding found or discovered claims. a simple reading of this fast letter established that these claims would be few and far between. to qualify for a new data claim rather than using the date stamped when the claim actually arrived at the va office, the claim had to be undiscovered and found in a claim